Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 09:13
Behavioral task
behavioral1
Sample
3d1f68d2afe943346b6eda3a0201b4d507b6921d6ded9c1e828211de248ab337.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
3d1f68d2afe943346b6eda3a0201b4d507b6921d6ded9c1e828211de248ab337.exe
-
Size
1.4MB
-
MD5
1d7dcf5e1066652d8bacbd0b288e3bcf
-
SHA1
e01aec6dc012f98535ba836f7fc00be371655010
-
SHA256
3d1f68d2afe943346b6eda3a0201b4d507b6921d6ded9c1e828211de248ab337
-
SHA512
38cf7415bfbcd15764aca9093a00c27dfd8febd734ce4257bc0265756417fc7efa8160ea7c62ae83c7e8ff3f40114e5fc444bebe662481245f9ce1ddebd7f87d
-
SSDEEP
24576:RVIl/WDGCi7/qkat6zqxG2Z9mIhQvq8wd7NjVb65GsL9QsdkutxbVUDk+3HuezME:ROdWCCi7/raWMmSdbbUGsVOutxGFbx
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/872-2-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-3-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-4-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-5-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-6-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-7-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-8-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-9-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-10-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-11-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-12-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig behavioral2/memory/872-13-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/872-0-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-2-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-3-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-4-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-5-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-6-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-7-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-8-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-9-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-10-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-11-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-12-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx behavioral2/memory/872-13-0x00007FF65F490000-0x00007FF65F7E1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3d1f68d2afe943346b6eda3a0201b4d507b6921d6ded9c1e828211de248ab337.exedescription pid process Token: SeLockMemoryPrivilege 872 3d1f68d2afe943346b6eda3a0201b4d507b6921d6ded9c1e828211de248ab337.exe Token: SeLockMemoryPrivilege 872 3d1f68d2afe943346b6eda3a0201b4d507b6921d6ded9c1e828211de248ab337.exe